Количество 41
Количество 41
ELSA-2015-3055
ELSA-2015-3055: Unbreakable Enterprise kernel security update (MODERATE)
ELSA-2015-3054
ELSA-2015-3054: Unbreakable Enterprise kernel security update (MODERATE)
ELSA-2015-1272
ELSA-2015-1272: kernel security, bug fix, and enhancement update (MODERATE)
ELSA-2015-3053
ELSA-2015-3053: Unbreakable Enterprise kernel security update (MODERATE)

CVE-2015-0239
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.

CVE-2015-0239
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.

CVE-2015-0239
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.
CVE-2015-0239
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel ...
GHSA-h9w7-gg89-fg55
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.
ELSA-2015-2152
ELSA-2015-2152: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2014-9683
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2014-9683
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2014-9683
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.
CVE-2014-9683
Off-by-one error in the ecryptfs_decode_from_filename function in fs/e ...
GHSA-9w96-6pfj-xgrv
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

SUSE-SU-2015:1376-1
Security update for Linux kernel

SUSE-SU-2015:0736-1
Security update for Linux kernel

CVE-2014-8133
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.

CVE-2014-8133
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.

CVE-2014-8133
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2015-3055 ELSA-2015-3055: Unbreakable Enterprise kernel security update (MODERATE) | около 10 лет назад | |||
ELSA-2015-3054 ELSA-2015-3054: Unbreakable Enterprise kernel security update (MODERATE) | около 10 лет назад | |||
ELSA-2015-1272 ELSA-2015-1272: kernel security, bug fix, and enhancement update (MODERATE) | около 10 лет назад | |||
ELSA-2015-3053 ELSA-2015-3053: Unbreakable Enterprise kernel security update (MODERATE) | около 10 лет назад | |||
![]() | CVE-2015-0239 The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction. | CVSS2: 4.4 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2015-0239 The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction. | CVSS2: 6.2 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2015-0239 The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction. | CVSS2: 4.4 | 0% Низкий | больше 10 лет назад |
CVE-2015-0239 The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel ... | CVSS2: 4.4 | 0% Низкий | больше 10 лет назад | |
GHSA-h9w7-gg89-fg55 The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction. | 0% Низкий | около 3 лет назад | ||
ELSA-2015-2152 ELSA-2015-2152: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 9 лет назад | |||
![]() | CVE-2014-9683 Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename. | CVSS2: 3.6 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2014-9683 Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename. | CVSS2: 3.6 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2014-9683 Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename. | CVSS2: 3.6 | 0% Низкий | больше 10 лет назад |
CVE-2014-9683 Off-by-one error in the ecryptfs_decode_from_filename function in fs/e ... | CVSS2: 3.6 | 0% Низкий | больше 10 лет назад | |
GHSA-9w96-6pfj-xgrv Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename. | 0% Низкий | около 3 лет назад | ||
![]() | SUSE-SU-2015:1376-1 Security update for Linux kernel | почти 11 лет назад | ||
![]() | SUSE-SU-2015:0736-1 Security update for Linux kernel | почти 11 лет назад | ||
![]() | CVE-2014-8133 arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value. | CVSS2: 2.1 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2014-8133 arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value. | CVSS2: 1.9 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2014-8133 arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value. | CVSS2: 2.1 | 0% Низкий | больше 10 лет назад |
Уязвимостей на страницу